Popular terms

Reverse Engineering topics
Reverse Engineering
Autonomous System
Medical Device
Integrated Circuit
System Resource
Computer System
Decryption
Executable
Semiconductor
Semiconductor Device
Cryptography
Encryption
Microprocessor
Microprocessors
Instruction Set Architecture

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Reverse Engineering patents



      

This page is updated frequently with new Reverse Engineering-related patent applications.




Date/App# patent app List of recent Reverse Engineering-related patents
05/12/16
20160132547 
 Apparatus and  managing apk file in an android platform patent thumbnailApparatus and managing apk file in an android platform
The present invention relates to an apparatus for managing an apk file in the android platform in order to forestall an executable file in an apk file from being analyzed by reverse engineering or decompiling that comprises a file reader that reads an original .dex file in the apk file, a file modifier that modifies the original .dex file the file reader has read and stores the modified .dex file in a readable folder in the apk file, a file creator that accesses the folder to read and restore the original .dex file, creates a temporary .dex file that is can be loaded onto memory and adds the temporary .dex file to the apk file in order to create a protected apk file and a file executer that reads from the folder and restores, if the android platform requests the protected apk file to be executed, the modified original .dex file by executing the temporary .dex file and loads the restored original .dex file onto memory in order to execute the protected apk file.. .
Seworks, Inc.


05/12/16
20160132327 
 Visual tool for reverse engineering software components patent thumbnailVisual tool for reverse engineering software components
A system and method of displaying a software application using a software architecture tool that includes: receiving a portion of an existing software application at the software architecture tool; identifying one or more software components of the existing software application from the received portion; automatically identifying a tier and layer location for each standard software component; and presenting one or more images that each represent the standard software component to a user, wherein the images visually identify a tier and layer location of each standard software component.. .
General Motors Llc


04/07/16
20160099714 
 Systems and methods for enhancing confidentiality via logic gate encryption patent thumbnailSystems and methods for enhancing confidentiality via logic gate encryption
Presented are systems and methods that allow hardware designers to protect valuable ip and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input.
Maxim Integrated Products, Inc.


04/07/16
20160099219 
 Semiconductor device having features to prevent reverse engineering patent thumbnailSemiconductor device having features to prevent reverse engineering
It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.
Secure Silicon Layer, Inc.


03/31/16
20160092675 
 Fine-grained address space layout randomization patent thumbnailFine-grained address space layout randomization
A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages.
Apple Inc.


03/31/16
20160092674 
 Aslr map obfuscation patent thumbnailAslr map obfuscation
A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages.
Apple Inc.


03/03/16
20160064339 
 Method for fabrication of an integrated circuit rendering a reverse engineering of the integrated circuit more difficult and corresponding integrated circuit patent thumbnailMethod for fabrication of an integrated circuit rendering a reverse engineering of the integrated circuit more difficult and corresponding integrated circuit
An integrated circuit includes a substrate with several functional blocks formed thereon. At least two identical functional blocks are respectively disposed at two or more different locations on the integrated circuit.
Stmicroelectronics (rousset) Sas


03/03/16
20160063221 
 More external storage of medical device program design parameters patent thumbnailMore external storage of medical device program design parameters
Many electronic medical devices include program design features that direct the operation of the device. The program design features of most electronic medical devices reside in the device itself and therefore are easily discovered by reverse engineering.

02/18/16
20160048704 
 Secure semiconductor device having features to prevent reverse engineering patent thumbnailSecure semiconductor device having features to prevent reverse engineering
An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises ibg circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises ibg circuitry.
Verisiti, Inc.


01/14/16
20160012212 
 Securing microprocessors against information leakage and physical tampering patent thumbnailSecuring microprocessors against information leakage and physical tampering
A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis..
Bluerisc Inc.


01/07/16
20160005485 

Semiconductor device having features to prevent reverse engineering


A rom circuit includes a first n channel transistor having an output and having device geometry and device characteristics adapted to bias the output at a predetermined level when a p channel circuit is connected to the first n channel transistor; a pass transistor connected between the output and a data bus, the pass transistor connected to a word line, the word line adapted to turn on the pass transistor when the word line is asserted; and the p channel circuit connected to the data bus and adapted to provide leakage current to charge a gate in the first n channel transistor when pass transistor is turned on.. .
Verisiti, Inc.


12/31/15
20150380365 

Individualised voltage supply of integrated circuits components as protective means against side channel attacks


A semiconductor device, in particular an integrated circuit with protection against side channel attacks, in particular imaging- and probing-based attacks, ema and reverse engineering, in which a metallic conductive layer of a first (104) and/or a second potential supply line (106) are each connected directly and individually to all the circuit components via respective individual conductor path structures (v1, v2).. .
Ihp Gmbh - Innovations For High Performance Microelectronics / Leibniz-institut FÜr Innovative


12/17/15
20150363580 

Protecting software through a fake cryptographic layer


The fake cryptographic layer obfuscation technique can be used to lure an attacker into expending reverse engineering efforts on sections of code the attacker would normally ignore. To do this the obfuscation technique can identify sections of code that are likely to be of lesser interest to the attacker and disguise them as higher value sections.
Apple Inc.


10/29/15
20150311167 

Semiconductor device having features to prevent reverse engineering


An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a second metal layer located at least partially over the first metal layer, wherein one or more gate connection is formed in the second metal layer, wherein removing a portion of the second metal layer disrupts at least one gate connection and deactivates the device.. .
Secure Silicon Layer, Inc.


09/17/15
20150262084 

Methods for defending static and dynamic reverse engineering of software license control and devices thereof


The technique relates to a method for defending static and dynamic reverse engineering of software license control and devices thereof. To defend static reverse engineering of software license control the licensed application is wrapped with encryption wrapper, wherein the encryption wrapper encrypts the application with a first password.
Infosys Limited


06/11/15
20150161363 

Method, system and device for protection against reverse engineering and/or tampering with programs


Unauthorized use of computer programs is made difficult by compiling a processor rather than just compiling a program into machine code. The way in which the processor should respond to machine instructions, i.e.
Koninklijke Philips N.v.


03/26/15
20150084195 

Semiconductor device having features to prevent reverse engineering


An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a second metal layer located at least partially over the first metal layer, wherein one or more gate connection is formed in the second metal layer, wherein removing a portion of the second metal layer disrupts at least one gate connection and deactivates the device.. .
Secure Silicon Layer, Inc.


03/12/15
20150071434 

Secure semiconductor device having features to prevent reverse engineering


An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises ibg circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises ibg circuitry.
Static Control Components, Inc.


03/05/15
20150066975 

Reporting tools for object-relational databases


A view schema is generated from a view definition, wherein the view schema includes one or more relational views that are created by translating one or more object queries in the view definition into one or more relational queries. A report design schema is generated from the view definition by: creating one or more report tables that correspond to the one or more relational views of the view schema and extending the one or more report tables with one or more primary key constraints and one or more foreign key constraints.
International Business Machines Corporation


03/05/15
20150066839 

Reporting tools for object-relational databases


A view schema is generated from a view definition, wherein the view schema includes one or more relational views that are created by translating one or more object queries in the view definition into one or more relational queries. A report design schema is generated from the view definition by: creating one or more report tables that correspond to the one or more relational views of the view schema and extending the one or more report tables with one or more primary key constraints and one or more foreign key constraints.
International Business Machines Corporation


02/12/15
20150047033 

Detecting co-occurrence patterns in dns


Techniques for inferring the existence of suspicious software by detecting multiple name server requests for the same sets of non-existent domains. Implementations can allow for detecting the existence of malware or other suspicious software without requiring reverse engineering of the malware's domain generation algorithm..
Verisingn, Inc.


02/12/15
20150046191 

System and managing genomic information


Various embodiments provide interfaces to access genomic testing information and incorporate it into daily physician practice. According to one aspect, a graph-based data model is used that may be used to organizes and revise precision medicine knowledge.
Foundation Medicine, Inc.


02/12/15
20150046180 

System and managing genomic information


Various embodiments provide interfaces to access genomic testing information and incorporate it into daily physician practice. According to one aspect, a graph-based data model is used that may be used to organizes and revise precision medicine knowledge.
Foundation Medicine, Inc.


01/29/15
20150033354 

Method for protecting an application program and related computer program product


A method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (dll) on said computer, comprises the steps of: adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library such that upon loading said application program and said loader into the main memory of said computer, said dynamic link library is initialized by said library loader instead of the operating system; the library loader and the pseudo-statically linked library could be embedded into the application program, thereby using unused space within the application. The protected application presents itself as a monolithic application without the vulnerable interface to a dll..

01/15/15
20150019447 

Reverse event signature for identifying hit and run vehicles


Identifying a vehicle involved in a hit-and-run accident may comprise generating a damage signature associated with a first vehicle that is left behind with collision damage in a hit-and-run accident. A reverse event signature may be generated that indicates a position of impact and severity of damage associated with a second vehicle involved in the hit-and-run accident that fled a scene of the hit-and-run accident.
International Business Machines Corporation


01/15/15
20150019069 

Reverse event signature for identifying hit and run vehicles


Identifying a vehicle involved in a hit-and-run accident may comprise generating a damage signature associated with a first vehicle that is left behind with collision damage in a hit-and-run accident. A reverse event signature may be generated that indicates a position of impact and severity of damage associated with a second vehicle involved in the hit-and-run accident that fled a scene of the hit-and-run accident.
International Business Machines Corporation


01/01/15
20150001748 

Method of laser processing mold surface


A method of laser processing a mold surface may include a first stage of extracting mapping data for forming an embossing pattern on the mold surface using laser processing, a second stage of extracting scanning data obtained by scanning the mold surface and matching the scanning data with the mapping data so as to extract processing data for laser processing, a third stage of performing a reverse engineering process for previously verifying error between measured data of the mold surface and the processing data when processing the mold surface to form the embossing pattern using the processing data, and a fourth stage of, when the error may be within an allowable tolerance, performing the laser process using a verified processing data.. .
Hyundai Motor Company


12/11/14
20140365437 

System and implementing database replication configurtions using replication modeling and transformation


A reverse engineering database replication data system is disclosed. In one embodiment, the replication data system receives an input of replication configuration data for a plurality of databases and builds memory models based on metadata accessed from the plurality of databases, which are then transformed to a first platform-specific replication model.

09/25/14
20140289167 

System and determining retail-business-rule coefficients from current prices


Business rules can govern a single price or they can define relationships between different products involving two or more decision prices. One problem that retailers can face is that business rules are generally not codified and are rarely followed consistently, and thus it can be difficult to articulate existing business rules or generate new business rules.

08/14/14
20140229352 

Trading style automated analysis and reverse engineering


A decision logic communicating with said processing logic, said decision logic having a repository for storing a set of buy/sell rules for buying and selling securities in response to said buy and sell data, said market news data, and said model trader order and execution data.. .

07/31/14
20140215211 

Split data exchange protocol


Embodiments of the invention include a system to manage software and protect it from reverse engineering and intrusion prevention. A security server stores server-side software and server-side keys for various software products.

07/31/14
20140212922 

Two plasmid mammalian expression system


reverse engineering has offered new ways of studying the pathology of rna viral infections, new more efficient devices of synthesizing recombinant viruses and developing vaccines and also demonstrated the versatility and efficiency of rna dependent rna polymerase rdrp system as an expression system. However, the currently used methods require a repertoire of complex, difficult-to-use tools.

07/17/14
20140201852 

Systems and methods for detecting and mitigating programmable logic device tampering


Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as fpgas, have two stages of operation; a configuration stage and a user mode stage.

07/17/14
20140200163 

Multiplexed genetic reporter assays and compositions


The invention provides methods for determining the activity of a plurality of nucleic acid regulatory elements. These methods may facilitate, e.g., the systematic reverse engineering, and optimization of mammalian cis-regulatory elements at high resolution and at a large scale.

07/17/14
20140198554 

Semiconductor device having features to prevent reverse engineering


A rom circuit includes a first n channel transistor having an output and having device geometry and device characteristics adapted to bias the output at a predetermined level when a p channel circuit is connected to the first n channel transistor; a pass transistor connected between the output and a data bus, the pass transistor connected to a word line, the word line adapted to turn on the pass transistor when the word line is asserted; and the p channel circuit connected to the data bus and adapted to provide leakage current to charge a gate in the first n channel transistor when pass transistor is turned on.. .

03/27/14
20140089202 

Crm security core


A security core supports a networked banking app for a client application device communicating with a server, such as e.g. A smartphone.

01/23/14
20140025358 

Systems and methods for modeling and analyzing networks


The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks.

12/05/13
20130320491 

Semiconductor device having features to prevent reverse engineering


It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.

11/21/13
20130311159 

Systems and methods for reverse engineering models of biological networks


The present invention provides methods and accompanying computer-based systems and computer-executable code stored on a computer-readable medium for constructing a model of a biological network. The invention further provides methods for performing sensitivity analysis on a biological network and for identifying major regulators of species in the network and of the network as a whole.

11/14/13
20130300454 

Method and camouflaging a standard cell based integrated circuit with micro circuits and post processing


A method and apparatus for camouflaging an application specific integrated circuit (asic), wherein the asic comprises a plurality of interconnected functional logic is disclosed. The method adds functionally inert elements to the logical description or provides alternative definitions of standard logical cells to make it difficult for reverse engineering programs to be used to discover the circuit's function.

10/31/13
20130291116 

Method for external storage of medical device program design parameters


Many electronic medical devices include program design features that direct the operation of the device. The program design features of most electronic medical devices reside in the device itself and therefore are easily discovered by reverse engineering.

09/19/13
20130242801 

Reverse engineering peering at internet exchange points


A technique for examining the relationships of autonomous systems (ases) participating in an internet exchange point (ixp) utilizes packet tracing servers proximate the ixps. Where such packet tracing servers cannot be found in the participating ases, the methodology identifies additional vantage points by looking at a list of ases that are one hop away from the ases at the ixp.

07/25/13
20130191803 

Method and camouflaging a standard cell based integrated circuit


A method and apparatus for camouflaging an application specific integrated circuit (asic), wherein the asic comprises a plurality of interconnected functional logic is disclosed. The method adds functionally inert elements to the logical description or provides alternative definitions of standard logic cells to make it difficult for reverse engineering programs to be used to discover the circuit's function..

07/11/13
20130179967 

Method to deter softwear tampering using interlinked sub-processes


A method is disclosed for deterring the reverse engineering of computer software code. The method involves the recognition of an unauthorized access attempt by one of a plurality of linked sub-processes embedded in the computer software code.

06/20/13
20130154687 

Semiconductor device having features to prevent reverse engineering


It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.

06/13/13
20130151865 

Securing microprocessors against information leakage and physical tampering


A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis..

05/16/13
20130125243 

Method for preventing software reverse engineering, unauthorized modification, and runtime data interception


A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which is capable of converting the software into a generalized machine code is provided.

04/11/13
20130091571 

Systems and methods of processing data associated with detection and/or handling of malware


The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed.

03/14/13
20130063731 

Non-contact scanning system


A non-contact scanning system for three dimensional non-contact scanning of a work piece is disclosed for use in various applications including reverse engineering, metrology, dimensional verification and inspection the scanning system includes a scanner carried by an arcuately configured gantry assembly and a fixture for carrying a work piece. The gantry assembly includes a fixed arcuately shaped gantry member and a telescopic arm that is movable in an arcuate direction relative to a rotary table that carries the object to be scanned.

03/07/13
20130061061 

Protecting look up tables by mixing code and operations


In the field of computer enabled cryptography, such as a cipher using lookup tables, the cipher is hardened against an attack by a protection process which obscures the lookup tables using the properties of bijective functions and applying masks to the tables' input and output values, for encryption or decryption. This is especially advantageous in a “white box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution.

03/07/13
20130060543 

Systems and methods for reverse engineering models of biological networks


The present invention provides methods and accompanying computer-based systems and computer-executable code stored on a computer-readable medium for constructing a model of a biological network. The invention further provides methods for performing sensitivity analysis on a biological network and for identifying major regulators of species in the network and of the network as a whole.

02/28/13
20130052822 

Techniques for impeding reverse engineering


Anti-reverse engineering techniques are provided. In one aspect, a method for forming at least one feature in an insulating layer is provided.

02/28/13
20130047714 

Insert assembly and fluid flow reverse engineering


A fluid testing apparatus for performing fluid flow analysis on a gas turbine engine component having a plurality of fluid cooling circuits each defining one or more openings in the component includes a first sealing insert configured to create a seal at an interface of the first sealing insert to the component to seal off one or more openings of a first fluid cooling circuit of the component and a generic insert separable from the first sealing insert. The first sealing insert is configured as a substantially flat sheet having a shaped perimeter, and the component is clampable to the generic insert to hold the first sealing insert against the component..

01/17/13
20130016836 

Cryptographic process execution protecting an input value against attacks


A cryptographic process (such as the aes cipher) which uses table look up operations (tlus) is hardened against reverse engineering attacks intended to recover the table contents and thereby the cipher key. This hardening involves removing any one-to-one correspondence between the tlu inputs and outputs, by altering the output of the tlu dynamically, e.g.

01/10/13
20130014267 

Computer protocol generation and obfuscation


In the field of computer science, communications protocols (such as computer network protocols) are hardened (secured) against reverse engineering attacks by hackers using a software tool which is applied to a high level definition of the protocol. The tool converts the definition to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as now expressed in source code, to prevent hackers from recovering useful details of the protocol.

01/10/13
20130010963 

Multiplicative splits to protect cipher keys


In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round keys using the properties of group field automorphisms and applying masks to the states of the cipher, for encryption or decryption. This is especially advantageous in a “white box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution.



Reverse Engineering topics: Reverse Engineering, Autonomous System, Medical Device, Integrated Circuit, System Resource, Computer System, Decryption, Executable, Semiconductor, Semiconductor Device, Cryptography, Encryption, Microprocessor, Microprocessors, Instruction Set Architecture

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Reverse Engineering for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Reverse Engineering with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.2822

3242

1 - 1 - 59